Featured Blogs
RockYou2024: Unpacking the Largest Password Leak in History
This Fourth of July brought fireworks in the form of a digital security breach, one that has been recorded as...
How to Safeguard Your Digital Assets While Backpacking on a Budget
Traveling on a budget while backpacking allows individuals to immerse themselves fully in local cultures, explore off-the-beaten-path destinations, and forge...
What is Doxing?
Imagine someone putting your personal information out online for thousands of strangers to see—your home address, phone number, even details...
How to Protect Yourself on Social Networks
There are now over 5 billion active social media users worldwide, representing 62.3% of the global population. While social networks...
Get Yourself AI-powered Scam Text Protection That Spots and Block Scams in Real Time
The tables have turned. Now you can use AI to spot and block scam texts before they do you harm. ...
The Top 10 Online Booking Scam Hotspots in the U.S. Revealed
With a record-breaking number of Americans set to travel over the July 4th holiday, most of them by car, scammers...
Quality Over Quantity: the Counter-Intuitive GenAI Key
It’s been almost two years since OpenAI launched ChatGPT, driving increased mainstream awareness of and access to Generative AI tools....
What Security Means to Families
What is our real job as parents? Is it to ensure our kids get good grades? – Maybe. Or is...
How to Protect Yourself from Vishing
“Vishing” occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers...
The Kaspersky Software Ban—What You Need to Know to Stay Safe Online
Citing national security concerns, the U.S. Department of Commerce has issued a ban on the sale of all Kaspersky online...
How to Safely Connect to Public Wi-Fi While Traveling
As the summer sun beckons us to explore new destinations, many of us rely on public Wi-Fi to stay connected...
Thelma – The Real-Life Voice Scam That Made It into the Movies
This has to be a first. Something from our blogs got made into a movie. We’re talking about voice scams,...
How Online Dating Scams work and How to Spot Them
Sarah didn’t see it coming. A single mom in her late 40s, “Sarah” was especially lonely after her divorce (name...
How Teens Date in the Digital Age
Falling in love in the internet age is a whole different ball game to the social-media-free ’70s, ’80s and ’90s....
How to Get Kids Focused on Their Online Privacy
Kids engage online far differently than adults. Between group chats, social apps, and keeping up with digital trends, their interests, and attention spans constantly shift, which means online privacy...
Sextortion: What Your Kids Need to Know
Sextortion is a nightmare scenario no parent wants to contemplate, yet recent FBI reports indicate a distressing rise in cases...
How to Avoid Being Phished by Your Phone
By now you’ve probably heard of the term “phishing”—when scammers try to fool you into revealing your personal info or...
How to Keep Your Kids Safe Online
I often joke about how I wish I could wrap up my kids in cotton wool to protect them from...